Tactical Control Center lets you identify and infest devices:
The identification method should be agreed with the operating center.
With Tactical Control Center you can:
When Tactical Control Center opens, a password must be entered, the same as the notebook on which it's running.
For a description of Tactical Control Center data see "Tactical Control Center data".
To learn more about Tactical Control Center see "What you should know about Tactical Control Center".
RCS8.2 | User's and Installation Guide | © COPYRIGHT 2012